Ubuntu alert USN-6902-1 (apache2)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> | |
Subject: | [USN-6902-1] Apache HTTP Server vulnerability | |
Date: | Thu, 18 Jul 2024 10:46:49 -0400 | |
Message-ID: | <10149f8c-d1e0-4824-90e6-a9d31d1d4163@canonical.com> |
========================================================================== Ubuntu Security Notice USN-6902-1 July 18, 2024 apache2 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Apache HTTP Server could be made to expose sensitive information over the network. Software Description: - apache2: Apache HTTP server Details: It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS apache2 2.4.58-1ubuntu8.4 Ubuntu 22.04 LTS apache2 2.4.52-1ubuntu4.12 Ubuntu 20.04 LTS apache2 2.4.41-4ubuntu3.21 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6902-1 CVE-2024-40725 Package Information: https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubun... https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubun... https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubun...
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmaZKtkACgkQZWnYVadE vpN3Xg//Usb428vDCD+8ys7mZ8hF/nFJbblhSInGdjZ0mdWGrb6KG3tz7Um80z7Q QeRLAUwGqM0AQq+y+fKY0QkdUz1aC5+35h7Dr831gsBJmD5HApTij+BE4gcp1b0P 4hkAxnPy8XjtnUAMCjopwWqYDUj9zF1C8uiJEJEQ+eVSx6RG90R0UUa82oHlWR9o pBzsG9QaTY6qjeN5t9qZe9oLVWVtqyKE1FHPBKJdVqqxNV7ts+Fk5Dx4DkSS1QjC UxKA/wsM6fL54moQf6EmFyiWe6bw85BQ6NmT48V/k2HuYXgLIWOOKehI8v/aXxRY exqinGm+HjbiBHzI3gneQ6EjsqMKUZUwcpo3z7Jn7pJE8IBfXsWKhJlp9bol/XYe KowtzPX08U1BibMhMPwSYURZppKnLKMV6gZjn052oGbVqH0joZ2k2cLmFpyvAo4U ctoqAhY6xfiDM4s/UdgXw3H2Y+ayNnBqt9GfCHoe3rJ9HAr8e++7wDSJjYbwfy8Q 8LOl+JKTZ5Gm107e3eJqtkud8TWFmYgRn5JQzGaOW1ZZpB+VfA4brZswt5V62aH5 WD7MVSEluaHq4mrGSQENNqJYB7LT9Kv2wEG9Eoh17OkPneKitIk3GqdRB2qHTyiK cFA+ULCN/Z8BIkhZ1BjBdykuiASpJayadWhQYGq94pOMHIQOpC4= =sCau -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)